Dailymotion is a French online video platform founded in 2005, offering users and publishers a space to upload, watch, and distribute professional and curated video content across categories such as news, sports, music, and entertainment.
Maintaining top-notch security online is a community effort and a high priority for Dailymotion. We're lucky to have a vibrant group of independent security researchers who volunteer their time to help us spot potential issues. To recognize the efforts of independent security researchers and the important role they play in keeping Dailymotion safe for everyone, we offer a bounty for reporting certain qualifying security vulnerabilities. Please review the following rules before you reporting a vulnerability. By participating in this Program, you agree to be bound by these rules.
WILDCARDS - PUBLIC DOMAINS:
These are our main public facing domains, all subdomains & services included in the listed wildcards included in the scopes of this program.
WILDCARDS - TECHNICAL DOMAINS:
These are domains mostly used for technical purposes, all subdomains & services included in the listed wildcards included in the scopes of this program
*.dmcdn.net: dedicated domain to distribute static content, including all our video content, distributed across our platforms & services.
DAILYMOTION PRO - B2B PLATFORMS:
These are platforms dedicated to our B2B customers, allowing them to manage our video hosting & distribution services, as well as define and coordinate advertising campaigns across our services & platforms.
MCP & AUTOMATION SERVERS:
The objective of these scopes is to test and report vulnerabilities on our MCP Servers, while complying with the rules and limitations defined by our program. These URLs are normally restricted and accessible only via our company's internal VPN and should not be publicly exposed on the internet. Our goal in including them in the program is to identify potential unauthorized access vulnerabilities that could allow an attacker to bypass these restrictions.
https://n8n-staging.k8s.dm.gg/*
Note concerning XSS and CSRF: We will tend to rate user session-related XSS and CSRF vulnerabilities, whether stored or reflected, with a low impact. For a (very) significant majority, users are unauthenticated and the chances of successfully exploiting such vulnerabilities are therefore minimized. Typically, a reflected XSS vulnerability on our main domain and implying the theft of user cookies on www. or *.dailymotion.com will be rated as Low. Please note that, if you are able to demonstrate an ability to exploit these vulnerabilities in creative ways (possibly combined with other vulnerabilities found by yourself) so as to provably increase the business impact, we will consider this final impact to evaluate the severity.
Note concerning IDOR: IDOR vulnerabilities on .api.dailymotion.com via /user/[ID] that does not lead to personal/sensitive info disclosing
Different User Types: We have several levels of privileges on the product: unauthenticated user, authenticated user, partner, partner with a verification badge. We invite you to go and explore the attack surface that is specific with each of these profiles as they are all in-scope.
Partner accounts are only granted to users after they have accepted the terms of our Dailymotion Partner Program Agreement. Security researchers interested in digging is this part of our perimeter can open such an account by signing up on our partner portal.
If you want to test the features exposed only to partners with a verification badge, please file a request on security@dailymotion.com so as to be provided with a verification badge (we'll then provide you with a temporary, dedicated partner account). For practical reasons, Dailymotion reserves the right to evaluate and deny such requests on a case by case basis; typically, we will only consider requests from hunters who have previously reported at least one qualifying vulnerability rated as Medium or more.
Please adhere to the following rules while performing research on this program:
As a complement to the Program’s rules and testing policy :
We are happy to thank everyone who submits valid reports which help us improve the security of Dailymotion, however only those that meet the following eligibility requirements may receive a monetary reward:
Reward amounts are based on:
Reports failing to demonstrate a tangible attack scenario and opportunity are unlikely to be rewarded. Please keep in mind that whatever you discover, you are required to demonstrate what you believe is a vulnerability. Because we evaluate reports based on business risks and tangible impacts, we don't reward theoretical vulnerabilities (the ones which are almost exploitable, but just "not quite there") — although we are always interested in reading about them!
For example, the exposure of our public website's JWT token for our GraphQL API is not a security issue. We know it's there, in your browser, but you can't do anything with it to attack other people's data (or if you can, do demonstrate your findings).
In the event that we choose not to reward a vulnerability with no demonstrable business impact (for example an XSS on a domain that does not have valuable cookies), we reserve the right to fix the issue in order to avoid further equivalent submissions by other researchers.
When conducting vulnerability research in good faith and in accordance with the terms specified in this Policy, we consider this research to be:
We won’t take legal action against, suspend, or terminate access to the Service for those who discover and report security vulnerabilities responsibly.
Dailymotion reserves all of its legal rights in the event of any noncompliance.
Dailymotion reserves the right to modify the terms of this Program or terminate this Program at any time.
If you have any concerns or are uncertain whether your security research is consistent with this policy please reach out to security@dailymotion.com before going any further.
| Scope Type | Scope Name |
|---|---|
| android_application | https://play.google.com/store/apps/details?id=com.dailymotion.dailymotion&hl=fr&gl=US |
| api | *.api.dailymotion.com |
| api | https://n8n-staging.k8s.dm.gg/ |
| api | https://n8n.pub.k8s.dm.gg/ |
| api | https://airflow-mcp.data.dailymotion.com/ |
| api | https://bigquery-mcp.data.dailymotion.com/ |
| ios_application | https://apps.apple.com/fr/app/dailymotion/id336978041 |
| undefined | AS41690 |
| web_application | *.dailymotion.com |
| web_application | *.dmcdn.net |
| web_application | *.dm.gg |
| web_application | *.kube.dm.gg |
| web_application | *.dmxleo.com |
| web_application | *.dm-event.net |
| web_application | https://dailymotion.webflow.io/ |
| web_application | https://business.dailymotion.com/ |
| web_application | https://pro.dailymotion.com/ |
| web_application | https://ray.dailymotion.com/ |
| Scope Type | Scope Name |
|---|---|
| undefined | Anything, domains or subdomains, not explicitly listed as in-scope above, is out-of-scope. |
| web_application | More specifically, *.ondailymotion.com domains are not in the scope of our program. |
The progam has been crawled by Firebounty on 2018-12-12 and updated on 2019-10-05, 2019 reports have been received so far.
FireBounty © 2015-2026